Sciweavers

1663 search results - page 138 / 333
» Privacy and Identity Management
Sort
View
CCS
2008
ACM
15 years 6 months ago
Robust content-driven reputation
In content-driven reputation systems for collaborative content, users gain or lose reputation according to how their contributions fare: authors of long-lived contributions gain r...
Krishnendu Chatterjee, Luca de Alfaro, Ian Pye
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
15 years 10 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch
ESORICS
2011
Springer
14 years 4 months ago
Supporting Concurrency in Private Data Outsourcing
Abstract. With outsourcing emerging as a successful paradigm for delegating data and service management to third parties, the problem of guaranteeing proper privacy protection agai...
Sabrina De Capitani di Vimercati, Sara Foresti, St...
SIGCOMM
2009
ACM
15 years 11 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
JUCS
2010
176views more  JUCS 2010»
14 years 11 months ago
Integrating Personal Web Data through Semantically Enhanced Web Portal
: Currently, the World Wide Web is mostly composed of isolated and loosely connected "data islands". Connecting them together and retrieving only the information that is ...
Lidia Rovan, Tomislav Jagust, Mirta Baranovic